- Advisory ID
- Betroffene Versionen
- 9.1 i586 , 9.1 i586
A vulnerability was discovered in the mutt text-mode email client in the IMAP code. This vulnerability can be exploited by a malicious IMAP server to crash mutt or even execute arbitrary code with the privilege of the user running mutt. Update: The packages for Mandrake Linux 9.1 and 9.1/PPC were not GPG-signed. This has been fixed and as a result the md5sums have changed. Thanks to Mark Lyda for pointing this out.
cdc89cf7ce476d92c56f58074784f0a3 ppc/9.1/RPMS/mutt-1.4.1i-1.1mdk.ppc.rpm b836f11d978e3236ad909d703009df16 ppc/9.1/SRPMS/mutt-1.4.1i-1.1mdk.src.rpm
7827038a2e22f1544f69c9cc77484b58 9.1/RPMS/mutt-1.4.1i-1.1mdk.i586.rpm b836f11d978e3236ad909d703009df16 9.1/SRPMS/mutt-1.4.1i-1.1mdk.src.rpm